He et al., 2024 - Google Patents
A time series intrusion detection method based on SSAE, TCN and Bi-LSTMHe et al., 2024
- Document ID
- 10869815787030687157
- Author
- He Z
- Wang X
- Li C
- Publication year
- Publication venue
- Computers, Materials, & Continua
External Links
Snippet
In the fast-evolving landscape of digital networks, the incidence of network intrusions has escalated alarmingly. Simultaneously, the crucial role of time series data in intrusion detection remains largely underappreciated, with most systems failing to capture the time …
- 238000001514 detection method 0 title abstract description 93
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/04—Architectures, e.g. interconnection topology
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Berman et al. | A survey of deep learning methods for cyber security | |
| Yuan et al. | Insider threat detection with deep neural network | |
| Rehman et al. | Evaluation of artificial intelligent techniques to secure information in enterprises | |
| US11552976B2 (en) | Systems and methods for social network analysis on dark web forums to predict enterprise cyber incidents | |
| Maseer et al. | Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges | |
| Aravamudhan et al. | A novel adaptive network intrusion detection system for internet of things | |
| He et al. | A time series intrusion detection method based on SSAE, TCN and Bi-LSTM | |
| Alghamdi et al. | Evaluation and selection models for ensemble intrusion detection systems in IoT | |
| Ahmed et al. | A modified transformer neural network (MTNN) for robust intrusion detection in IoT networks | |
| Nethala et al. | A deep learning-based ensemble framework for robust android malware detection | |
| Xiong et al. | Domain adaptation-based deep learning framework for android malware detection across diverse distributions | |
| Jacob et al. | A systematic analysis and review on intrusion detection systems using machine learning and deep learning algorithms | |
| Al-Harbi et al. | A dual-stage deep learning model based on a sparse autoencoder and layered deep classifier for intrusion detection with imbalanced data | |
| Ahmed et al. | Re-Evaluating Deep Learning Attacks and Defenses in Cybersecurity Systems | |
| EA | A Novel Paradigm for IoT Security: ResNet-GRU Model Revolutionizes Botnet Attack Detection. | |
| Alraba'nah et al. | Enhancing intrusion detection using hybrid long short-term memory and XGBoost | |
| Kumar et al. | Intrusion detection at the edge computing: A deep learning approach using the unsw-nb15 dataset | |
| Pentapalli et al. | A gradient-optimized TSK fuzzy framework for explainable phishing detection | |
| Matin et al. | Convolutional Neural Networks for Imbalanced Advanced Security Network Metrics and Non‐Payload‐Based Obfuscations Dataset to Detect Intrusion | |
| Vrejoiu | Neural networks and deep learning in cyber security | |
| Sangeetha et al. | A comparative analysis of deep learning based techniques for cyber security | |
| Bhimavarapu | Deep Learning for Digital Forensics: Advancing Criminal Investigations | |
| Liu et al. | XGBoost-LR: A method for network traffic anomaly detection | |
| Meda et al. | Artificial intelligence based malicious traffic detection | |
| Solanki et al. | A novel intrusion detection framework using ensemble learning in MQTT IoT applications |